DG Platform Technical Overview WP
DG Platform Technical Overview WP
DG Platform Technical Overview WP
Fortra.com Page 1
Fortra White Paper Digital Guardian Technical Overview
Table of Contents
1. Introduction 3
7. Technology Integrations 18
8. Deployment Models 19
Fortra.com Page 2
Fortra White Paper Digital Guardian Technical Overview
Introduction
Today’s most successful enterprises are instrumenting and digitizing virtually every aspect of their business. This change is dramatically
increasing the value and volume of sensitive data that must be protected.
Enterprise data loss prevention (DLP) is a time-tested solution that ensures your organization’s most sensitive data is properly
protected. However, the rapid release schedules and accelerating changes in operating systems, applications, and browsers can
cause many traditional enterprise DLP solutions to be woefully inefficient. Organizations using software from DLP providers who
aren’t keeping up are spending too much time, effort and budget troubleshooting, and not enough time delivering meaningful data
protection. New entrants are touting “DLP-lite” as a solution to the inefficiencies of traditional enterprise DLP, though they often gloss
over the big compromises inherent in “DLP-lite”. With lite- or no-agent architectures and no endpoint controls, what you gain from an
“easy install” and lite-agent, you lose in increased risk of data leakage and loss.
You need a better way to protect the data that matters most to your organization without the inefficiencies of traditional enterprise
DLP or the data protection compromises of “DLP-lite.”
Fortra.com Page 3
Fortra White Paper Digital Guardian Technical Overview
Only Digital Guardian provides all four of these capabilities to find, understand, and secure sensitive data assets and stop data
theft or abuse from both insiders and outsiders and better manage risk from a consolidated platform.
System Events • Filters out the noise • Controls that don’t slow down
your business
+ • Accelerates investigation • Controls across network, storage,
User Events • Delivers incident discovery cloud and endpoints
• Controls that are enforceable on all OS’s
+
Data Events
Deepest Visibility
Visibility to all your data, and an understanding of what it
represents, is the most critical aspect of protecting your data.
This is the foundation for successful data protection programs. Each of these three areas can deliver
Visibility must include data events, user events, and system
insights, but the combination of data,
events, across endpoints, databases or shares, network traffic,
user and system event visibility provides
Each of these three areas can deliver insights, but the com-
and cloud storage. Without this comprehensive view intelligent bination of data, user and system event visibility provides
Fortra.com Page 4
Fortra White Paper Digital Guardian Technical Overview
• User Events focus on what each individual or process is actively doing with sensitive data. Digital Guardian understands who users are,
their role in the organization, the tasks applications or processes can perform, and which policies apply to each. This includes keyboard
or terminal commands such as cut/copy/paste, as well as the use of applications like file transfer tools, or uploading documents via
the network.
• System Events are what happens outside of direct user intervention and are initiated at the operating system level. System events c
an be expected and trusted, such as the process of Adobe launching a .PDF file. They can also be unexpected and potentially malicious,
like an Adobe launch prompting rogue processes to modify registry settings, or a PowerShell launch.
Each of these three areas can deliver insights, but the combination of data, user and system event visibility provides the full context needed
to protect sensitive data from all threats, internal or external.
Real-Time Analytics
System, user, and data events each mean something. By combining them, Digital Guardian sees the risky activity targeting sensitive data,
within the noise of normal activities, and can stop it at the time of use, or abuse. This intelligence speeds the discovery of incidents while
accelerating the investigation process and simplifying compliance. The enterprise wide view provides the full timeline of events and a
defensible chain of custody in the logs to show document movement.
Digital Guardian provides real-time detection of advanced threats, forensics, incident management, and risk reduction to protect data from
unauthorized use. Endpoint Detection and Response (EDR) solutions identify, in near real-time, patterns that indicate the presence of
malicious software, system compromise or malware that mimics user behavior in attempting to exfiltrate sensitive data. Digital Guardian
utilizes predefined rules developed by our security experts to prevent attackers from gaining access to enterprise computers, custom rules
are easily created.
Digital Guardian’s breadth and depth of monitoring and control capabilities make it an ideal platform to drive incident response and
investigations. Digital Guardian records event forensics by time, user, system, application, file type, file classification, and network operation.
These correlated events are bundled, hashed, time-stamped, and cryptographically signed at the point of use for investigative analysis.
Further, for compliance driven requirements, the deep visibility supports the full picture of all sensitive data movement and demonstrates
the compliance posture of the organization.
Flexible Controls
Policies are a way of translating data protection goals into consistent and actionable rules applied throughout the business. Digital
Guardian’s flexible controls enforce policies on and off your corporate network for the data protection you need without impacting
workflows.
Controls include the ability to alert both information security teams and users to potentially risky data usage in real time. Prompts allow
users to justify their actions, and are recorded for auditing purposes; information security teams immediately see data movements and can
track when data is at risk or automatically block these actions. Additionally, data can be automatically encrypted or quarantined as needed
to maintain data security and support compliance efforts. All activity is tracked and maintained in evidentiary-quality logs. These controls
work across the following egress channels:
• Network • Cloud
• Web • Endpoint
• Data Repository
Fortra.com Page 5
Fortra White Paper Digital Guardian Technical Overview
When a user accesses data, Digital Guardian acts based on classification of the data, the context of the action, and the applicable policy(s).
If the action is allowed by policy, Digital Guardian is silent. If the action violates an organizational policy, Digital Guardian can apply a
wide range of controls to data usage based on data content, context, user, application or system process, and risk type. The controls range
from logging silently to actively blocking activity. DG can monitor and log without blocking when a patient’s data is sent to the insurance
company, but block when that same data is sent to a personal Gmail address.
Data control policies are built in the Digital Guardian Management Console then deployed to sensors for enforcement. Digital Guardian
monitors all actions on endpoints, traffic on the network, and data in cloud storage for coverage throughout the extended enterprise.
Policy control options can be applied automatically based on user, risk condition, and other operating variables. The resulting matrix
delivers comprehensive coverage for all data use and data egress to prevent data loss.
Data Sources
Data Events
User Events
Data Repositories
Endpoint
Network
Applications Time
Fortra.com Page 6
Fortra White Paper Digital Guardian Technical Overview
Digital Guardian data protection endpoint agents are available for laptops, desktops, servers, and virtual environments. The agent provides
full visibility, controls, and analytics for the following operating systems:
Fortra.com Page 7
Fortra White Paper Digital Guardian Technical Overview
Digital Guardian Kernel Level Agent for The Deepest View Into your Data
Digital Guardian integrates directly into the kernel for a simple reason; it is the only way to have full visibility to all events on a device.
Preventing data loss at the endpoint requires visibility to all the protected data, at all times, on and off your network, and visibility to all
of the different ways one could attempt to steal or leak sensitive information.
To better protect sensitive information wherever it resides requires an understanding of the content of the data (e.g., data considered
sensitive or subject to regulatory standards such as PCI-DSS or HIPAA), the role and privileges of a user, system, or process accessing the
data (what actions are allowed and by which users), and the context of how the data is being used. In other words, an understanding of
every action on every piece of data by every user, application, or process. This can only be achieved by leveraging the power of the kernel.
On a computer, the kernel manages all requests and system calls to the CPU, memory, and input/output devices (e.g., mouse, keyboard,
disk, and USB drives). By integrating in the kernel, Digital Guardian’s agent provides the deepest visibility possible, and enforces policies
by leveraging the kernel to control access to input and output devices, or applications such as email, peer-to-peer networks, and external
storage/sharing.
Least
Application / User Privileged
Kernel
Tamper Resistance
Digital Guardian executables are protected from termination and are self-monitoring; an attacker cannot kill, debug, or inject code into
our processes. All components are signed, signatures are verified on start-up and update.
Self-monitoring ensures that DG is running and that rules are active. When started, the DG Service initializes an Agent on the device (this
executable is hidden from view,). Periodically, the Agent checks the Service to ensure the Service is running, communicating with the
Service Control Manager, and set to automatic restart. If any of those conditions are not met, the Agent will restart the Service, and a new
Agent will be initialized.
The Digital Guardian platform also knows when an agent it expects to see is no longer reporting to the management console and logs
this condition.
Fortra.com Page 8
Fortra White Paper Digital Guardian Technical Overview
Stealth Mode
When the Stealth configuration option is enabled, Digital Guardian hides all related processes and files to thwart attempts to find and
bypass the agent. Agent processes are never visible in the Task Manager, Activity Monitor, or other applications that enumerate running
processes. In addition, all Digital Guardian files and folders are hidden on the file system. Registry entries are also protected to prevent
viewing or modifying entries, or changing an entry’s security attributes.
Ensuring Compatibility
Digital Guardian has partnered with Microsoft to ensure that, upon release of new versions of Windows, Digital Guardian will deliver
compatibility and interoperability. Digital Guardian receives pre-release, development builds of Windows for testing and Microsoft provides
Azure-hosted VM’s and dedicated engineering staff to support the development process.
The appliance architecture consists of specialized sensors that monitor the full TCP stack and can provide policy protection enforcement
for both inbound and outbound connections. The appliance’s scalable architecture provides flexible deployment options; single network
appliances can perform multiple functions from network monitoring and enforcement to discovery of data stored in various repositories.
Appliance capabilities may be decoupled and deployed across multiple locations reporting into a single DGMC management platform. The
Digital Guardian appliance works across:
• Storage Repositories - Discovery and Fingerprinting: Windows CIFS & SMB, NFS
• Databases - Discovery and Fingerprinting: MS SQL, Oracle, mySQL, DB2, Sybase, Informix, PostgreSQL
• Cloud - Discovery and Fingerprinting: Box, O365 (OneDrive), Egnyte, Citrix Fileshare, Accellion
Accurate Data Classification and Protection with the Digital Guardian Appliance
The goal in identifying sensitive information is often to prevent
the inadvertent release of “known information” such as employee
In a side by side comparison with a
social security numbers, patient identifiers, or customer credit
card numbers. A 10-character string may represent a patient competing solution, the traditional
record, but it may also be a phone number or just a random methods without DBRM missed at least
string. To minimize false positives and false negatives in common 87% (650/750) of real PHI, while still
Each of these three areas can deliver insights, but the com-
formats, DG’s Database Record Matching (DBRM) provides a fast,
producing 94%
bination (1700/1800)
of data, user and system event visibility provides
reliable, and accurate method to identify matches to the actual context into data movements, the context you need to
data in question.
false
protectpositives.
sensitive data from all threats, internal or external.
Fortra.com Page 9
Fortra White Paper Digital Guardian Technical Overview
DBRM uses mathematical hashes to find, categorize, and tag sensitive data. Starting with a training set, DBRM generates a unique, one-way
hash for each record; a digital “fingerprint” for each specific data element (e.g., patient record number, social security number, account ID).
It then inspects target data such as emails, web postings, uploads to cloud storage, or removable media, generates hashes to identify exact
matches of the fingerprints of known sensitive data. Adding a 2nd hashed database element (e.g., a patient’s name) and requiring the 2
hashed elements to exist near to each other reduces false alarms to negligible rates.
DG Analytics
Digital Guardian Analytics is an advanced analytics, workflow and reporting cloud service. DG analyzes events in context, leveraging
streaming data from Digital Guardian endpoint agents and network sensors, providing the deepest visibility into system, user, and data
events. That visibility powers security analyst-approved dashboards and workspaces to enable data loss prevention, managed detection
& response and user entity & behavior analytics from a single console.
DG Analytics packages over 150 man-years of data defense techniques into over 100 behavior-based rules. Anomaly detection with
advanced statistical models and machine learning filter the noise and identify events that warrant additional investigation by your IR
and security teams.
DG Workspaces
Information needs vary with roles. DG’s SaaS solution has workspaces and workflows preconfigured based on our experience protecting
organizations against data loss. Our information security experts, threat hunters, incident responders, and security leaders developed
workspaces to guide security professionals to the events that matter when identifying anomalous and suspicious insider and outsider
activity. Analysts can easily drill down to follow an event and determine next steps or create custom dashboards, reports and workspaces.
Real-time reports provide the information your team needs to make better decisions. Regardless of your role, the tools and information
you need are ready and customizable as your needs evolve.
DG Management Console
The Digital Guardian Management Console (DGMC) is your web-based configuration and management hub within our platform.
It enables you to set up and deploy agents and policies across your global deployment. Policies configured in the DGMC are distributed
to and enforced by the agents and appliances.
DG Applications
Digital Guardian delivers protection from internal and external threats on the endpoint, over the network, and into the cloud.
Our comprehensive suite of data protection applications lets you find, understand, and protect your organization while supporting
regulatory compliance.
Fortra.com Page 10
Fortra White Paper Digital Guardian Technical Overview
Applications
• Data Discovery – Find the sensitive data in your organization and view how it is used.
• Data Classification – Classify structured and unstructured data based on content, context, and user input.
• Data Loss Prevention – Monitor and control data usage to stop sensitive data from leaving your network and support compliance.
• Endpoint Detection and Response – Detect, investigate, and mitigate suspicious activities and behaviors at the endpoint.
Powered by Digital Guardian Managed Security Program.
• Cloud Data Protection – Stops the loss of data in cloud applications such as Office 365.
Data Discovery
Data visibility is the foundation to data protection. Digital Guardian Data Discovery uses automatic, configurable scanning of local and
network shares using specific inspection policies to ensure all data at rest is discovered, wherever it is located. Pre-configured templates
speed discovery of PHI, PCI, and PII data while customized templates deliver flexibility for other data types and emerging regulations.
DG’s DBRM “fingerprinting” can be used to minimize false positives and false negatives, adding efficiency to data discovery.
DG Data Discovery brings immediate value to organizations. When an initial scan completes, managers receive alerts for any data identified
in a location that violates policy, including a detailed list of the files, their location(s) and the specific policy violated. These documents can
also be automatically quarantined to address compliance or security policies. Data discovery is extended to the cloud through integrations
with leading cloud storage providers to scan repositories, enabling encryption, removal, or other automated remediation of sensitive data
before the file is shared in the cloud - data that is already stored in the cloud can be scanned and audited at any time.
Classification
Many organizations find the task of understanding what constitutes critical data, where it resides, and how it is used overwhelming
without the use of intelligent automation. Digital Guardian addresses this by providing automated classification of data, and then applying
classification tags to the data, tracking its use, and preventing its misuse.
By understanding the sensitivity of each piece of data, organizations achieve greater control without affecting business processes. Digital
Guardian supports automated content classification for over 300 file types and 90 languages, including structured and unstructured data types.
Digital Guardian’s integrated classification engine can simultaneously identify, tag, and manage sensitive data in real time according
to policy. Digital Guardian manages and enforces data policies from discovery forward, without needing to connect to a centralized
clearinghouse to confirm a file or email’s sensitivity.
Fortra.com Page 11
Fortra White Paper Digital Guardian Technical Overview
This combination of technology-based and user-driven decisions provides balance and ensures the right polices are enforced on the right
data. Digital Guardian incorporates the classification into alerts, elevating events targeting high value data to drive immediate action.
By providing this multi-faceted approach, organizations can classify their data with the highest accuracy while providing automation
and controls to stop data theft.
Whether the data is structured or unstructured, Digital Guardian knows where it is and how it is being used. DG understands the context
of how sensitive data is used, seeing at the system, user, and data level. When data is used according to policy, Digital Guardian is invisible
to end users, allowing access and use of data. When policies are violated, or actions are attempted that could put sensitive data at risk, DG
can apply a wide range of controls, from warnings to hard blocks.
• Network DLP
Digital Guardian Network DLP can be configured and deployed to monitor and control movement of sensitive information via the
network, email, or web. It works by inspecting all network traffic for sensitive information, then enforcing company policies to protect
that information from misuse. Pre-configured policies for data covered by regulatory standards are bundled with Network DLP, including
PII, PHI, and PCI. A policy wizard provides the flexibility to create customized policies, ensuring you protect what matters most to your
organization and supporting compliance needs. Reports provide a detailed picture of sensitive and regulated data for audits.
The Network DLP appliance can be deployed as a physical machine, a virtual machine, or as an image in cloud services like Microsoft
Azure to monitor and protect all communication channels, including email, Web, File Transfer Protocol, Secure Sockets Layer, and
applications such as webmail, blogs, and social media.
Fortra.com Page 12
Fortra White Paper Digital Guardian Technical Overview
Cloud Infrastructure
Our purpose-built SaaS infrastructure enables you and your team to focus more time, energy, and resources on identifying and mitigating
risks to your sensitive data and less time on acquiring, building and maintaining the infrastructure.
This service leverages the scalability, data visualization and ease-of-use security analysts need. Centralized reporting in the cloud removes
storage limitations and gives you the ability to aggregate, analyze and query system, user and data related events across the network and
endpoints over longer periods of time.
Policy actions for both Endpoint Agents and Network Appliances range from logging to hard blocking of actions, in every case Digital
Guardian creates a detailed log of the event. The range of options includes the following:
• Log – User is unaware of any action; Digital Guardian creates a detailed log of the action, but allows user to proceed.
• Alert – User is unaware of any action; Digital Guardian generates an alert that this may be a high priority event
but allows action
• Prompt – User is aware of action; on-screen prompt alerts user to potential risky behavior, but allows user to proceed
• Justify – User is aware of action; on-screen prompt alerts user to potential risky behavior, but allows user to proceed
if they provide a justification
• Block – User is aware of action; on-screen prompt alerts user to potential risky behavior, but does not allow user to proceed
• Encrypt – User can either be aware or unaware based on preferences; documents are automatically encrypted prior
to completing action, typically email or transfer to storage repository
• Quarantine – User can either be aware or unaware based on preferences; documents are automatically removed
to a secure quarantine and a place holder is left in its place.
Agent based inspection understands the content and context of the data and occurs on the Windows, Mac, or Linux endpoint, as well as Citrix VDI.
Digital Guardian appliances monitor network and web traffic via either a Switch Port Analyzer (SPAN) or Test Access Point (TAP) to provide
instant visibility into policy violations and report incidents involving sensitive information. The appliance includes an inline Mail Transfer
Agent (MTA) to integrate with local mail server for email inspection and control. Digital Guardian leverages the APIs of cloud storage
providers to inspect cloud content. This allows Digital Guardian to analyze traffic before files are shared in the cloud. Information that
is already stored in the cloud can be audited at any time with the same remediation action.
Fortra.com Page 13
Fortra White Paper Digital Guardian Technical Overview
Application Control
Advanced threats often introduce and spawn new processes to affected devices. Digital Guardian can detect these malicious applications,
block execution or access to protected data, and alert Incident Response in near real time. Digital Guardian provides organizations with
the ability to control which applications run in their environments, and what actions those executables and processes can take with data.
Digital Guardian understands the function of each application, and prevents applications from being coopted to perform data movements
that would compromise security.
With Digital Guardian, organizations can block unknown executables and ensure that only approved applications are used. This includes
legitimate, but undesirable applications such as peer-to-peer networking or chat applications, as well as unknown software that may
be malicious. Administrators can enforce the use of specific browsers with controlled settings, including limiting internet access to the
company’s network proxy or VPN.
Virus Total
Digital Guardian can send process data in the form of MD5, SHA1, or SHA256 hashes to VirusTotal to identify viruses, worms, trojans, and
other kinds of malicious executables and content. VirusTotal scans the hashes to identify suspicious content and provide information back
to DG. Security teams can analyze the scan data to determine whether it poses a threat to the enterprise and take appropriate action.
Fortra.com Page 14
Fortra White Paper Digital Guardian Technical Overview
FireEye
The FireEye platform is a virtual execution engine used to identify and block cyber-attacks in real time. FireEye-generated IIndicators of
Compromise (IOC) describe malware and attack methodologies. Digital Guardian receives FireEye Indicators of Attack describing attack
methodologies, and converts the (IoC) into rules for endpoint agents to confirm the extent of an infection, quickly contain that infection,
and block new infections.
Technology Integrations
Digital Guardian complements an organization’s security programs, and integrates with other solutions for enhanced alerting, security
and forensics.
Network Security
Network security solutions detect external threats and network attacks by working in conjunction with Digital Guardian. Digital Guardian
partners with Palo Alto Networks and FireEye to provide a comprehensive security solution on both the network and endpoint. Suspicious
files on endpoints can be delivered to the network systems for detonation and analysis before they execute, or to VirusTotal for examination.
Boldon James
Data Classification
Fortra.com Page 15
Fortra White Paper Digital Guardian Technical Overview
Deployment Models
Organization experience challenges either deploying security solutions or successfully running the solutions over the long term.
They are generally related to:
With years of experience deploying DLP and EDR solutions across global enterprises and a proven deployment methodology, Digital
Guardian can help any organization achieve its compliance and security data protection goals quickly and maintain value over time.
The priorities (compliance, security, budget) and resources of each organization are unique, and evolve over time. To support this,
Digital Guardian offers flexible deployment options. Customers can deploy as a SaaS or as a Managed Security Program.
Digital Guardian’s SaaS solution provides customers with the analytics, workflow and reporting analysts require for threat aware data
protection, without the need to deploy and manage the associated hardware and software. This removes storage limitations and gives
you the ability to aggregate, analyze and query system, user and data related events across the network and endpoints. You get big data
security without investing in a big data infrastructure.
• Simpler Audits – DG’s SOC is managed to meet SSAE 16 standards, including ongoing investments in people and processes.
Defenses are monitored 24x7 by staff years of security experience.
• Faster Time-to-Value – No need to order hardware or set up a new SOC. DG is ready when you are and can deploy when you are.
• Elastic Scalability – A primary benefit of a cloud architecture is the ability to scale up (or down) on a moment’s notice. Instead of
ordering new hardware, testing updates in a development environment, rebalancing servers, and training new personnel,
the DG cloud scales on demand. Adding endpoints anywhere in the world is simple.
Fortra.com Page 16
Fortra White Paper Digital Guardian Technical Overview
Digital Guardian utilizes a SaaS model and hosts all hardware and software at a secure SSAE 16 certified data center.
DG MSP benefits include:
• Fully managed data protection infrastructure: Digital Guardian deploys, hosts and manages data protection infrastructure
including: data classification; policy rules, alerts and controls; event forensics; risk analytics.
• Instant access to security experts: The Digital Guardian MSP team has deep, practical experience implementing mission-critical
data security, risk, and incident response and compliance programs.
• Immediate risk awareness and mitigation: You receive instant alerts and escalations of insider/outsider threats and noncompliant
activities. You access live and configurable dashboards to gain real-time insights into sensitive data location, usage and threats.
Incident review is scheduled per your requirements.
• Fast deployment: Digital Guardian MSP can be deployed and operating in full production mode in 90 days or less using our proven
methodologies that help you achieve actionable results fast.
About Fortra
Fortra is a cybersecurity company like no other. We're creating a simpler, stronger future for our
customers. Our trusted experts and portfolio of integrated, scalable solutions bring balance and
control to organizations around the world. We’re the positive changemakers and your relentless ally
Fortra.com
to provide peace of mind through every step of your cybersecurity journey. Learn more at fortra.com.
© Fortra, LLC and its group of companies. All trademarks and registered trademarks are the property of their respective owners. (fta-dg-wp-1022-r1-79d)